Re: brute force ssh attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Matthew Miller wrote:
[snip]
>> So the "method of getting root privileges" is "regular users of their
>> own machines" running random executables (like the ones downloaded by a
>> script kiddie) as root.
>>
>> I'm interested in hearing how you would like to close this
>> vulnerability.
>
> In this case, some simple "don't do that" would have helped. But in the
> case of the sort of tricks that work on Windows users ("But the e-mail
> came from my friend!" "I wanted to see the funny animation it said was in
> there!") can work on Linux users too.

Only if you read your e-mail as root, which there is no reason to do.

> We need to *address* that, not just
> say "this is approximately zero threat". Obviously education is part of
> it. A more sophisticated SE Linux could be another.

A more sophisticated SELinux would require a more sophisticated user to
administer it.  Catch-22.

-- 
William Hooper


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux